Anatomy of a Cyber Attack (Accounting & Auditing Conference)


CPE Credits



PICPA Member: $29 | Nonmember: $39

 More Information

Course No.

You will have up to 90 days after the date of purchase to complete the course and take the exam.


If you attended the Accounting Auditing Conference on December 7, 2016, this course would be considered a duplicate and cannot be used towards your CPE requirement.

Earn CPE anywhere!

Listen to Ken Pyle cover the following:

  • Trends in data security
  • Insurance risk
  • Cybersecurity risk in internal audits


Ken Pyle
DFDR Consulting LLC

Ken Pyle is a partner and Chief Information Security Officer of DFDR Consulting. He has specialized in Information Security, Computer Forensics, Enterprise Virtualization and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance and Secure Design. Prior to joining DFDR, he served as a Security and Network Engineer for several Information Technology companies and as the IT Director/Security Engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors and other highly secure facilities on issues of Information Security, Computer Forensics and Secure Network Design.

Ken has lectured on Information Security and has published several whitepapers on subjects including public information gathering via Social Networking and Social Engineering. Ken was a featured speaker at the 2014, 2013 & 012 Wolters Kluwer CCH User Conference lecturing on "Information Security and Defending the Enterprise" and "Anatomy of a Cyber Attack". Ken is a regular lecturer and presenter on Information Security and has presented for several accounting associations and professional organizations including Prime Global, RBMA and AGN. Ken is also a subject matter expert for Information Security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. He was also recognized as a "40 under 40" by South Jersey Business People in 2015.

He holds numerous security and technology certifications from companies such as Guidance Software, EC-Council, Cisco, VMware, CompTIA and AccessData. Ken has published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.

March 2017

You May Also Like

Annual Accounting and Auditing Update Webinar
Feb. 21 | Webinar
Keep abreast of current private company standard setting activities of the PCC Review and apply recently issued FASB, ASB, and ARSC ...
Recently Issued U.S. GAAP - What Small and Mid-Size Nonpublic Entity CPAs Need to Know and Do Now, Not Later Webinar
Feb. 23 | Webinar
Describe the important accounting policy elections to consider related to Private Company Council (PCC) U.S. GAAP alternatives available to nonpublic entities ...
Guide to the New Revenue Recognition Model for All CPAs Webinar
Feb. 26 | Webinar
Explain the FASB’s new revenue recognition guidance found in Topic 606 Describe the FASB's new five-step revenue recognition model ...